GIAC G2700 - GIAC Certified ISO-2700 Specialist Practice Test
Which of the following are computer clusters that are implemented primarily for the purpose of providing high availability of services which the cluster provides?
Which of the following formulas is used to represent the annualized loss expectancy (ALE)?
Which of the following are the limitations of Redundant Array of Inexpensive Disks (RAID)?
Each correct answer represents a complete solution. Choose all that apply.
You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of change management?
Each correct answer represents a complete solution. Choose all that apply.
Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?
Which of the following are process elements for remote diagnostics?
Each correct answer represents a complete solution. Choose all that apply.
John, a novice web user, makes a new e-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are steps of vulnerability management programs?
Each correct answer represents a complete solution. Choose all that apply.
Sam uses Monte Carlo simulation to quantitatively assess cost and schedule risks of his project during planning processes. During risk monitoring and control, Sam repeats the technique, but it leads to different results. Which of the following cannot be the reason for the difference in results?
Which of the following surveys found that the smaller organizations had had a better understanding of their information assets?